Good to Great: Why Some Companies Make the Leap … and Others Don’t

فهرست مطالب کتاب Good to Great: Why Some Companies Make the Leap … and Others Don’t:

Chapter 1 – Good is the Enemy of Great

Chapter 2 – Level 5 Leadership

Chapter 3 – First Who … Then What

Chapter 4 – Confront The Brutal Facts (Yet Never Lose Faith)

Chapter 5 – The Hedgehog Concept – (Simplicity within the Three Circles)

Chapter 6 – A Culture of Discipline

Chapter 7 – Technology Accelerators

Chapter 8 – The Flywheel and The Doom Loop

Chapter 9 – From Good To Great To Built To Last

Epilogue – Frequently Asked Questions

Appendix 1.A – Selection Process for Good-To-Great Companies

Appendix 1.B – Direct Comparison Selections

Appendix 1.C – Unsustained Comparisons

Appendix 1.D – Overview of Research Steps

Appendix 2.A – Inside Versus Outside CEO Analysis

Appendix 5.A – Industry Analysis Rankings

Appendix 8.A – Doom Loop Behavior in the Comparison Companies

Appendix 8.B – Summary of Acquisition Analysis

Gray Hat Hacking The Ethical Hackers Handbook (Second Edition)

فهرست مطالب کتاب Gray Hat Hacking The Ethical Hackers Handbook:

Part I – Introduction to Ethical Disclosure

Chapter 1: Ethics of Ethical Hacking

Chapter 2: Ethical Hacking and the Legal System

Chapter 3: Proper and Ethical Disclosure

Part II – Penetration Testing and Tools

Chapter 4: Using Metasploit

Chapter 5: Using the BackTrack LiveCD Linux Distribution

Part III – Exploits 101

Chapter 6: Programming Survival Skills

Chapter 7: Basic Linux Exploits

Chapter 8: Advanced Linux Exploits

Chapter 9: Shellcode Strategies

Chapter 10: Writing Linux Shellcode

Chapter 11: Basic Windows Exploits

Part IV – Vulnerability Analysis

Chapter 12: Passive Analysis

Chapter 13: Advanced Static Analysis with IDA Pro

Chapter 14: Advanced Reverse Engineering

Chapter 15: Client-Side Browser Exploits

Chapter 16: Exploiting Windows Access Control Model for Local Elevation of Privilege

Chapter 17: Intelligent Fuzzing with Sulley

Chapter 18: From Vulnerability to Exploit

Chapter 19: Closing the Holes: Mitigation

Part V – Malware Analysis

Chapter 20: Collecting Malware and Initial Analysis

Chapter 21: Hacking Malware

Group Policy Fundamentals, Security, and the Managed Desktop

فهرست مطالب کتاب Group Policy Fundamentals, Security, and the Managed Desktop:

1 Starting Up a Cisco Router

2 Domestic Router Functions Configuration

3 Routing Protocols Configuration

4 Advanced Routing Protocols Configuration

5 WAN Technologies

6 Security Configuration

7 Cisco Router Management

8 Remote Connectivity to Cisco Router

9 Hints and Tips

Guide to Cisco Routers Configuration Becoming a Router Geek

فهرست مطالب کتاب Guide to Cisco Routers Configuration Becoming a Router Geek:

1 Starting Up a Cisco Router

2 Domestic Router Functions Configuration

3 Routing Protocols Configuration

4 Advanced Routing Protocols Configuration

5 WAN Technologies

6 Security Configuration

7 Cisco Router Management

8 Remote Connectivity to Cisco Router

9 Hints and Tips

Further Guidance

Hackers & Painters: Big Ideas from the Computer Age

فهرست مطالب کتاب Hackers & Painters: Big Ideas from the Computer Age:

1. Why Nerds Are Unpopular

2. Hackers and Painters

3. What You Can’t Say

4. Good Bad Attitude

5. The Other Road Ahead

6. How to Make Wealth

7. Mind the Gap

8. A Plan for Spam

9. Taste for Makers

10. Programming Languages Explained

11. The Hundred-Year Language

12. Beating the Averages

13. Revenge of the Nerds

14. The Dream Language

15. Design and Research

Hackers Delight (Second Edition)

فهرست مطالب کتاب Hacker’s Delight (Second Edition):

Chapter 1. Introduction

Chapter 2. Basics

Chapter 3. Power-Of-2 Boundaries

Chapter 4. Arithmetic Bounds

Chapter 5. Counting Bits

Chapter 6. Searching Words

Chapter 7. Rearranging Bits And Bytes

Chapter 8. Multiplication

Chapter 9. Integer Division

Chapter 10. Integer Division By Constants

Chapter 11. Some Elementary Functions

Chapter 12. Unusual Bases For Number Systems

Chapter 13. Gray Code

Chapter 14. Cyclic Redundancy Check

Chapter 15. Error-Correcting Codes

Chapter 16. Hilbert’s Curve

Chapter 17. Floating-Point

Chapter 18. Formulas For Primes

Hacking with Python The Ultimate Beginners Guide

فهرست مطالب Hacking with Python The Ultimate Beginners Guide:

Chapter 1: Preparation For Hacking

Chapter 2: Python Basics

Chapter 3: Writing Python Programs

Chapter 5: Operators and Expressions

Chapter 6: Functions and Modules

Chapter 7: Setting Up for Hacking

Chapter 8: Network Hacking

Chapter 9: Hacks for the Web

Chapter 10: Understanding Attacks Using Python

Chapter 11: Other Nifty Hacks to Try

Conclusion

Bonus: Preview Of ‘Introduction to Python 3

How Google Tests Software

فهرست مطالب کتاب How Google Tests Software:

Foreword & Preface

Foreword by Alberto Savoia

Foreword by Patrick Copeland

Preface

Chapter 1: Introduction to Google Software Testing

Quality ≠ Test

Roles

Organizational Structure

Crawl, Walk, Run

Types of Tests

Chapter 2: The Software Engineer in Test

The Life of an SET

Development and Test Workflow

Who Are These SETs Anyway?

The Early Phase of a Project

Team Structure

Design Docs

Interfaces and Protocols

Automation Planning

Testability

SET Workflow: An Example

Test Execution

Test Size Definitions

Use of Test Sizes in Shared Infrastructure

Benefits of Test Sizes

Test Runtime Requirements

Case Study: Change in Common Library

Test Certified

Interviews:

Founders of the Test Certified Program

SETs

Tool Developer Ted Mao

WebDriver Creator Simon Stewart

Chapter 3: The Test Engineer

A User-Facing Test Role

The Life of a TE

Test Planning

Risk

Life of a Test Case

Life of a Bug

Recruiting TEs

Test Leadership at Google

Maintenance Mode Testing

Quality Bots Experiment

BITE Experiment

Google Test Analytics

Free Testing Workflow

External Vendors

Interviews:

Google Docs TE – Lindsay Webster

YouTube TE – Apple Chow

Chapter 4: The Test Engineering Manager

The Life of a TEM

Getting Projects and People

Impact

Interviews:

Gmail TEM – Ankit Mehta

Android TEM – Hung Dang

Chrome TEM – Joel Hynoski

The Test Engineering Director

Interviews:

Search & Geo Test Director – Shelton Mar

Engineering Tools Director – Ashish Kumar

Google India Test Director – Sujay Sahni

Engineering Manager – Brad Green

James Whittaker

Chapter 5: Improving How Google Tests Software

Fatal Flaws in Google’s Process

The Future of the SET

The Future of the TE

The Future of the Test Director and Manager

The Future of Test Infrastructure

In Conclusion

Appendix A: Chrome OS Test Plan

Overview of Themes

Risk Analysis

Per-Build Baseline Testing

Per-LKG Day Testing

Per-Release Testing

Manual Versus Automation

Dev Versus Test Quality Focus

Release Channels

User Input

Test Case Repositories

Test Dashboarding

Virtualization

Performance

Stress, Long-Running, and Stability

Test Execution Framework (Autotest)

OEMs

Hardware Lab

E2E Farm Automation

Testing the Browser AppManager

Browser Testability

Hardware

Timeline

Primary Test Drivers

Relevant Documents

Appendix B: Test Tours for Chrome

The Shopping Tour

The Student Tour

The International Calling Tour

The Landmark Tour

The All Nighter Tour

The Artisan’s Tour

Tools in Chrome

The Bad Neighborhood Tour

The Personalization Tour

Appendix C: Blog Posts on Tools and Code

Take a BITE out of Bugs and Redundant Labor

Unleash the QualityBots

RPF: Google’s Record Playback Framework

Google Test Analytics — Now in Open Source

Comprehensive

Quick

Actionable

Sustained Value

Index

How to Use Instagram for Business: Guide 2023

فهرست مطالب:

Introduction

Identifying goals & creating a strategy

Engagement and followers

Square pix to video: Insta today

Instagram: The Platform In-depth

Conclusion

Additional resources

HPE Synergy Administration Student Guide

فهرست مطالب کتاب HPE Synergy Administration Student Guide:

Module 0: Course Overview

Module 1: HPE Synergy Solution

Module 2: HPE Synergy Cabling

Module 3: HPE Synergy Networking

Module 4: HPE Synergy Storage

Module 5: HPE Synergy Composability

Module 6: HPE Synergy Firmware

Module 7: HPE Synergy Analytics

Module 8: HPE Synergy Maintenance and Growth

HPE Synergy For Dummies, 2nd Edition

فهرست مطالب:

Introduction

Chapter 1 The Idea Economy and Composable Infrastructure

Chapter 2 HPE Synergy Overview

Chapter 3 HPE Synergy Frame

Chapter 4 HPE Synergy Composer

Chapter 5 HPE Synergy Image Streamer

Chapter 6 HPE Synergy Composable Compute

Chapter 7 HPE Synergy Composable Storage

Chapter 8 HPE Synergy Composable Fabric

Chapter 9 Ten Key Tips about Synergy

Appendix HPE Services for Synergy